Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Sciences

Energy Efficiency Data Mining And Scheduling Optimization Of Discrete Workshop, Yugu Lin, Wang Yan Dec 2019

Energy Efficiency Data Mining And Scheduling Optimization Of Discrete Workshop, Yugu Lin, Wang Yan

Journal of System Simulation

Abstract: This paper addresses the optimization of energy consumption in discrete workshops and establishes the energy efficiency optimization model of discrete workshops. The relationship between data mining and knowledge discovery is established. Through scheduling data preprocessing and C4.5 decision tree learning algorithm, the discovery of scheduling knowledge is realized. Energy efficiency optimization calculation is achieved in discrete workshops by the combination of scheduling knowledge and improved differential evolution algorithm (IDE). By comparing with TLBO, GA and PSO, the feasibility of IDE algorithm is verified.


Optimization Of Material Release For Printed Circuit Board Template Based On Data Mining, Shengping Lü, Qiangsheng Yue, Liu Tao Jan 2019

Optimization Of Material Release For Printed Circuit Board Template Based On Data Mining, Shengping Lü, Qiangsheng Yue, Liu Tao

Journal of System Simulation

Abstract: Data mining were employed for the optimization of material release of PCB (Printed Circuit Board) template. PCB scrap ratio related parameters were specified and prediction model variables were chosen according to hypothesis test. Multiple linear regression (MLR), Chi-squared automatic interaction detector, artificial neural network and support vector machine approaches for the prediction of scrap ratio were employed. Evaluation indictors called as superfluous ratio, supplement release ratio and weighted sum of the two were presented; the material release simulation was conducted and then the four approaches were compared and MLR was taken as the preferred one. Adjust coefficient …


Mining And Validation Of Attacking Behavior In The Robocup 2d Simulation, Chen Bing, Zhang Heng, Zekai Cheng, Dong Peng, Lin Chao Jan 2019

Mining And Validation Of Attacking Behavior In The Robocup 2d Simulation, Chen Bing, Zhang Heng, Zekai Cheng, Dong Peng, Lin Chao

Journal of System Simulation

Abstract: Robocup is an international academic competition which focuses on artificial intelligence and robotics. The 2D simulation is one of the earliest and most influential projects in Robocup. Attacking is the core behaviour of the simulated football game, as well as the attack recognition is considered as an important part in team-confrontations. This paper selects some active and contribution index of attacking, extracts lots of attacking behaviour data of the key agents, proposes two kinds of attacking patterns of 2D simulation, as ‘separate attack’ and ‘cooperative attack’, according to the human-player actions. The following simulation tests give the accuracy of …


Heart Attack Mortality Prediction: An Application Of Machine Learning Methods, Issam Salman Jan 2019

Heart Attack Mortality Prediction: An Application Of Machine Learning Methods, Issam Salman

Turkish Journal of Electrical Engineering and Computer Sciences

The heart is an important organ in the human body, and acute myocardial infarction (AMI) is the leading cause of death in most countries. Researchers are doing a lot of data analysis work to assist doctors in predicting the heart problem. An analysis of the data related to different health problems and its functions can help in predicting the wellness of this organ with a degree of certainty. Our research reported in this paper consists of two main parts. In the first part of the paper, we compare different predictive models of hospital mortality for patients with AMI. All results …


Data Analysis Through Social Media According To The Classified Crime, Serkan Savaş, Nuretti̇n Topaloğlu Jan 2019

Data Analysis Through Social Media According To The Classified Crime, Serkan Savaş, Nuretti̇n Topaloğlu

Turkish Journal of Electrical Engineering and Computer Sciences

The amount and variety of data generated through social media sites has increased along with the widespread use of social media sites. In addition, the data production rate has increased in the same way. The inclusion of personal information within these data makes it important to process the data and reach meaningful information within it. This process can be called intelligence and this meaningful information may be for commercial, academic, or security purposes. An example application is developed in this study for intelligence on Twitter. Crimes in Turkey are classified according to Turkish Statistical Institute criminal data and keywords are …